Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
178,842
result(s) for
"Terrorists."
Sort by:
The babylon gene
When violent Johadists bomb a Masonic lodge in Istanbul, the Turkish military enlist maverick British agent Toby Ashe to find the cause of the attack. Hurled into a tense race against the CIA to solve an intelligence puzzle encompassing genetic research and the true origins of Freemasonry, Ashe must travel the globe in pursuit of answers.
Kodiak sky
For decades, the top-secret Red Cell Seven unit has operated beyond the reach of the law--defending the United States by any means necessary, with absolute impunity. But the tables have turned, and the untouchable anti-terror squad is under attack. Determined to end Red Cell Seven's ruthless, lawless existence, the U.S. president has tapped military assassin extraordinaire Skylar McCoy to lead a covert search and destroy mission. But McCoy isn't the only one gunning for Red Cell Seven. A vengeful drug lord has dispatched his own hired killers to eliminate the elite commandos as the first step in the ultimate terrorist plot: exterminating the highest echelons of American government. Caught in the middle, the agents of RC7 must fight their dirtiest, most devastating battle--and dare to decide who will be saved or sacrificed for the greater good.
The Age of Lone Wolf Terrorism
by
Spaaij, Ramón
,
Hamm, Mark
in
LAW / Criminal Law / General
,
POLITICAL SCIENCE
,
POLITICAL SCIENCE / Terrorism
2017
The lethality of lone-wolf terrorism has reached an all-time high in the United States. Isolated individuals using firearms with high-capacity magazines are committing brutally efficient killings with the aim of terrorizing others, yet there is little consensus on what connects these crimes and the motivations behind them. InThe Age of Lone Wolf Terrorism, terrorism experts Mark S. Hamm and Ramón Spaaij combine criminological theory with empirical and ethnographic research to map the pathways of lone-wolf radicalization, helping with the identification of suspected behaviors and recognizing patterns of indoctrination.Reviewing comprehensive data on these actors, including more than two hundred terrorist incidents, Hamm and Spaaij find that a combination of personal and political grievances lead lone wolves to befriend online sympathizers-whether jihadists, white supremacists, or other antigovernment extremists-and then announce their intent to commit terror when triggered. Hamm and Spaaij carefully distinguish between lone wolves and individuals radicalized within a group dynamic. This important difference is what makes this book such a significant manual for professionals seeking richer insight into the transformation of alienated individuals into armed warriors. Hamm and Spaaij conclude with an analysis of recent FBI sting operations designed to prevent lone-wolf terrorism in the United States, describing who gets targeted, strategies for luring suspects, and the ethics of arresting and prosecuting citizens.
The terrorist's dilemma
2013
How do terrorist groups control their members? Do the tools groups use to monitor their operatives and enforce discipline create security vulnerabilities that governments can exploit?The Terrorist's Dilemmais the first book to systematically examine the great variation in how terrorist groups are structured. Employing a broad range of agency theory, historical case studies, and terrorists' own internal documents, Jacob Shapiro provocatively discusses the core managerial challenges that terrorists face and illustrates how their political goals interact with the operational environment to push them to organize in particular ways.
Shapiro provides a historically informed explanation for why some groups have little hierarchy, while others resemble miniature firms, complete with line charts and written disciplinary codes. Looking at groups in Africa, Asia, Europe, and North America, he highlights how consistent and widespread the terrorist's dilemma--balancing the desire to maintain control with the need for secrecy--has been since the 1880s. Through an analysis of more than a hundred terrorist autobiographies he shows how prevalent bureaucracy has been, and he utilizes a cache of internal documents from al-Qa'ida in Iraq to outline why this deadly group used so much paperwork to handle its people. Tracing the strategic interaction between terrorist leaders and their operatives, Shapiro closes with a series of comparative case studies, indicating that the differences in how groups in the same conflict approach their dilemmas are consistent with an agency theory perspective.
The Terrorist's Dilemmademonstrates the management constraints inherent to terrorist groups and sheds light on specific organizational details that can be exploited to more efficiently combat terrorist activity.
Clinton's War on Terror: Redefining US Security Strategy, 1993-2001
by
Boys, James D
in
Clinton, Bill,-1946
,
Influence
,
POLITICAL SCIENCE / International Relations / General
2018,2022
In the aftermath of the catastrophic attacks of September 11, 2001, President Bill Clinton's time in office was portrayed as one in which vital opportunities to confront growing threats to US security were missed. Firmly challenging this characterization, James Boys explores the long-misunderstood approach adopted by the Clinton administration as it sought to define an effective response to acts of political violence.Boys argues that only by understanding the efforts of Clinton and his team to address international terrorism can we make sense of the reasoning behind the actions of George W. Bush, Barack Obama, and Donald Trump, all of whom inherited, continued, and expanded on Clinton-era policies and practices. Drawing on official documents and on interviews with key players, he reveals the evolution of counterterrorism strategy throughout the Clinton administration, as well as the ramifications that it has today.